Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2025, 15:02

General

  • Target

    JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe

  • Size

    272KB

  • MD5

    65e4bc9f33a8b382c02d34bf69f15e9f

  • SHA1

    4e16d4ba45ead14c26eb6880b32ccd43cf6d2481

  • SHA256

    407e18e6787da05679a918c9ae48d6358054a7e27c62d36dde7e5a798335d48d

  • SHA512

    e5435e389003dc50a829ddb099e8070506780a3a7e7909f3fc94ea5aa8ac8c8c8b2710ffbc9701726842f0738cbf773ea39e6a27b184f19d7da890b1d244fc45

  • SSDEEP

    6144:zW////q5kqfDWOTQeBVlc363RR/X32SJ0zxVhZ/Jn6XZPp:zW////q5faO9PlhhR/21rhZ/JYZPp

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 16 IoCs
  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xy8-ebbt.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8CFF.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8CFE.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4628
    • C:\Users\Admin\AppData\Local\Temp\URamKV.exe
      "C:\Users\Admin\AppData\Local\Temp\URamKV.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1696
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      C:\Users\Admin\AppData\Local\Temp\svchost.exe
      2⤵
      • Adds policy Run key to start application
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1176
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:4092
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\svchost.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:640
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\svchost.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3608
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:1500
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\B0Z41YQFLX.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\B0Z41YQFLX.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2548
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\B0Z41YQFLX.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\B0Z41YQFLX.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:4840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES8CFF.tmp

    Filesize

    1KB

    MD5

    c78cb1c06b25ee869839f12e8a9f8a04

    SHA1

    e2fb7e6ffa5d1d8ad717262bbd07931818679434

    SHA256

    69c763d96ada3ad09704be6a3964a89d8d2bdd5d9b01a5fa486540a1e3e8a912

    SHA512

    1dc82ce84f63e1cbcccd2ff4e4418e6030c7188e46117a810f91454b9be8a7fa08e36e589bba5012c40e0274026cec8859da36a07096ecaa7c2985b2a82fe3aa

  • C:\Users\Admin\AppData\Local\Temp\URamKV.exe

    Filesize

    4KB

    MD5

    875c8a5378f1f314dd11fd8dc45d4cd9

    SHA1

    b93597b2e2996ee915cdf461dfc6591326f1de9d

    SHA256

    0cb43ddf86500d5af51c14a70ab9cc7f8e7a1480e9859dc70756cd06e9fdc8b9

    SHA512

    346f0194826cb6f6a124b061b6ce5e95f4472da2b50dd1504fbda01ff41dd95ee412fb615ca96afc3cf722443f740af6683dfc307f2d3f334f3cb71e4d1964a6

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    34KB

    MD5

    e118330b4629b12368d91b9df6488be0

    SHA1

    ce90218c7e3b90df2a3409ec253048bb6472c2fd

    SHA256

    3a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9

    SHA512

    ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC8CFE.tmp

    Filesize

    644B

    MD5

    b6085519974d5a1c1f789d34b718db3e

    SHA1

    000ca4f23a10d87ca708e4f1054c69635779e8b3

    SHA256

    6210dc15b6a0da72c83fc5b532106bd807f84f631776657e7337f74654719953

    SHA512

    35145a8122ecbded61637b4d40c27000413a788d9ce55e0c5bf2f4d38cbc961e7f4f89b4a6b8a76e50abf2a97bc6813986f13f50fcaf30580e12eef8bca7595d

  • \??\c:\Users\Admin\AppData\Local\Temp\xy8-ebbt.0.cs

    Filesize

    1KB

    MD5

    3454a6e858e7358492a86a523bf7fd7e

    SHA1

    74c90ca50f25680fd7332c496306f865023aea4d

    SHA256

    f0729c2e0620f65fc29c14faa25c9ed8c3d035ec180fcc191311597f310b5a0a

    SHA512

    4b475ced5e20c89eade83bb7c2cbe7564cf90c4378feee546a565649a5ec8e3e5c52af0fabc5d64ea212a9cc7d74c4823a801e1ec91c28508867d69be04a9afd

  • \??\c:\Users\Admin\AppData\Local\Temp\xy8-ebbt.cmdline

    Filesize

    259B

    MD5

    ea073b14e9f84c2b89a1adb64b5db3ba

    SHA1

    9676912452f4ab6445303c41401dcb4778e131de

    SHA256

    006fc200719f4acaa4b44363700e34bae194593b7448f80afb9601732e8bd58c

    SHA512

    b89738a3ad20c506aed5cc37fc395e159310d3902e1d41bf749e413a0f877db6333166d2a0012839372b84de99fd274f993daeb5c4415ed63607f8c0cb3ec861

  • memory/1696-22-0x0000000074870000-0x0000000074E21000-memory.dmp

    Filesize

    5.7MB

  • memory/1696-41-0x0000000074870000-0x0000000074E21000-memory.dmp

    Filesize

    5.7MB

  • memory/1696-19-0x0000000074870000-0x0000000074E21000-memory.dmp

    Filesize

    5.7MB

  • memory/1696-21-0x0000000074870000-0x0000000074E21000-memory.dmp

    Filesize

    5.7MB

  • memory/1980-8-0x0000000074870000-0x0000000074E21000-memory.dmp

    Filesize

    5.7MB

  • memory/1980-15-0x0000000074870000-0x0000000074E21000-memory.dmp

    Filesize

    5.7MB

  • memory/2444-32-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-70-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-86-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-31-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-83-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-37-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-80-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-76-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-42-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-46-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-50-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-53-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-56-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-60-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-63-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-66-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-25-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2444-73-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2776-1-0x0000000074870000-0x0000000074E21000-memory.dmp

    Filesize

    5.7MB

  • memory/2776-36-0x0000000074870000-0x0000000074E21000-memory.dmp

    Filesize

    5.7MB

  • memory/2776-0-0x0000000074872000-0x0000000074873000-memory.dmp

    Filesize

    4KB

  • memory/2776-2-0x0000000074870000-0x0000000074E21000-memory.dmp

    Filesize

    5.7MB